Announcement

Collapse
No announcement yet.

How to identify a CyberStalker:

Collapse
This topic is closed.
X
This is a sticky topic.
X
X
  • Filter
  • Time
  • Show
Clear All
new posts

  • RRicho
    replied
    Start a new post if you wish to discuss this topic .... necroposting.

    Leave a comment:


  • arezzo
    replied
    This is all fine and dandy but not all of us are so proficient on the internet.........maybe it would be a great idea if it would at all be possible to explain in depth one area at a time of what you were talking about if it is at all possible

    Leave a comment:


  • Antares78
    replied
    6. Do not add anyone as a friend.. Even when you hide your friend list some stalkers can find you from your friend's friend list if their lists is not hidden as well. Also moderators can see everything on this site regardless of privacy settings so keep that in mind.. there is no such thing as "privacy settings" on any social networking site..
    Understood,but what if you're a person like me looking to make friends here at IP? #6 in my mind seems like a double-edged sword in my book. How can a person like myself get to know others if I cannot even interact or befriend them???

    Leave a comment:


  • Guest's Avatar
    Guest replied
    Originally posted by qpqpqp
    JohnDoe41571; great input. In short; there is no such thing as true privacy online. :lol: Got to love being screwed over. People should just be cautious and think (key word) before they act.
    key word? lol.. thats about as secure as 837737 . think indeed

    Leave a comment:


  • Guest's Avatar
    Guest replied
    JohnDoe41571; great input. In short; there is no such thing as true privacy online. :lol: Got to love being screwed over. People should just be cautious and think (key word) before they act.

    Leave a comment:


  • Guest's Avatar
    Guest replied
    Re: How to identify a CyberStalker:

    Originally posted by qpqpqp
    Originally posted by 57125486
    unless he/she/it is the US government or superbadass elite hacker or ~spy~
    :^)
    Fame at last, huh? :shock:

    Leave a comment:


  • Guest's Avatar
    Guest replied
    Here is a good article on the The Top 10 Anonymity Myths

    https://xerobank.com/support/article...onymity-myths/



    When you visit a website, the webmaster can see your IP address, which identifies your unique Internet connection and where you are geographically. The webmaster can also see what kind of browser you use, what pages you looked at on his/her website, and what you typed while on the site. Search engines and other massive information processors also keep eternal databases that collect your interests, preferences, search queries, and responses. Additionally, your ISP can see everywhere you go, every email you send and receive, every purchase you make, and every instant message, and they may keep or sell records of this information. Further, most governments engage in overt or covert domestic spying on communications under the auspices of national security.




    When you use an anonymity service, you are taking away most spying ability from your network administrator, ISP, and whatever websites you visit. This is because you are using an intermediary. However, there are two attack methods that are capable of defeating most anonymity systems; they are global spying, which governments and large corporations can perform, and side-channel attacks, which can be performed by anyone. These two attacks often work because they operate outside of the anonymity network's scope.

    Global spying is a brute-force attack that occurs when an ISP is solicited to give access to centralized communication hubs, such as Internet exchanges and cloud-computing clusters. This allows global spies to view virtually all Internet traffic, retracing communications through an anonymity network back to its source with a technique called traffic analysis. The other method, side-channel attacks, work by exposing attributable data about the user of the anonymity service, which can be anything from writing style analysis of a blog post to full IP Address disclosure.

    Most commercial services are based in weak, centralized jurisdictions that will surrender your identity if requested. Most non-commercial services are strong enough to evade most domestic spying because they are distributed and decentralized. Very few commercial anonymity networks are capable of evading both domestic spying and international spying, because they use resource-intensive techniques like those outlined above. However, no anonymity service provider can protect a target that a superpower intelligence agency is devoting all its resources to trying to track down. Incidentally, terrorists and organized cybercriminals know this, so they use botnets to create anonymity for themselves instead of relying on traditional anonymity networks.

    The existence of these botnets creates a unique usergroup protection for the stronger commercial anonymity services. Virtually all users are automatically protected to the highest levels of anonymity, even against global adversaries, because they are excluded from focused targeting on account of the botnets.

    Leave a comment:


  • Guest's Avatar
    Guest replied
    Re: How to identify a CyberStalker:

    Originally posted by 57125486
    unless he/she/it is the US government or superbadass elite hacker or ~spy~
    :^)

    Originally posted by Croga
    But realy.... You're paranoid. Vigilance is good, paranoia not so much... We're still all here to enjoy ourselves and if everyone stuck to your rules then no one would be penpaling anymore.
    You are missing the point. Obviously this info is too much for you to handle.


    @57125486 (if it decides to read this) & Everyone.
    I will also add that all suggestions prove fruitless if the "stalker" has your IP Address. Ports are the weakest link in a network. AVs and Firewalls allow certain software/applications and Host OSs to bypass them, hence leaving an Open Port vulnerable to various packets of death. KeyLoggers, backdoor trojans, worms, malware in general can be sent through this Open Port without detection. Yeah, sure you maybe able to prevent much of that when you're using a third party site as the middle-man, but as soon as you start conversing with your unknown "stalker" via any Messenger Applications such as MSN and Yahoo you are therefore an easy target. There are numerous tools to aid certain individuals that can Sniff Packets and Cookies (which you should clear in your browers after each and every session and never store your passwords on your computer/s) as well. Chat Rooms are also vulnerable, since Java bypasses AVs & Firewalls security too. Many Admins and Webmaster downplay this and express they have apparent (less than effective) Filtering on, but this is not difficult to bypass thanks to some tools.

    Also note, it is possible to add links in forums taking unsuspecting victims to another page embed with even a tracker which aids in finding out your IP address and basic info. Even more worrisome for you all is that the off-site link/s may contain hidden arbitrary code itself.

    Just don't give any "stalker" (including hackers and script-kiddies) a reason to want to hunt you. Don't give out any indication that you are a millionaire as an example. Don't piss people off, as you never know if they have the knowledge to give you a lovely packet present. Commands can be sent to your computer remotely. Seriously do not go out of your way to troll, flame, or piss people off without first understanding the consequences and if you are prepared to accept they may very well steal your personal data or least of your concerns send you trojan.

    Nevertheless, some great points have been expressed by 57125486, but as "it" says, "humans are the weakest link". Self control over wanting to click links is of utmost importance. Always first check the destination of links via hovering your mouse over the link and observing the url in the browsers taskbar.

    Leave a comment:


  • Ikrash
    replied
    you cant> If one gets identified he is not a stalker just another teenage trying to escape from his world.

    Leave a comment:


  • Croga
    replied
    Originally posted by 57125486
    Once you are on Interpals securely, privately, and anonymously you should still want to stay "under the radar" so-to-speak..
    Hard to follow your own advise isn't it? I mean; your advise should at least include something saying "NEVER EVER post on the forums".

    But realy.... You're paranoid. Vigilance is good, paranoia not so much... We're still all here to enjoy ourselves and if everyone stuck to your rules then no one would be penpaling anymore.

    Leave a comment:


  • Guest's Avatar
    Guest replied
    hmm thats helpful

    Leave a comment:


  • Guest's Avatar
    Guest replied
    Once you are on Interpals securely, privately, and anonymously you should still want to stay "under the radar" so-to-speak..

    Below are some tips that may help in assisting that goal:

    1. Put as little information on your profile as possible. DO NOT UPLOAD A PICTURE. Uploading a picture will automatically make you standout like a sore-thumb in the "online" page whenever you login.. Many stalkers, scammers, and whatnots use the InterPals "Search" engine and the Online Filter to find their prey they select the "with photo" option.. Without a photo you automatically become much lesser of a target on here..

    2. DO NOT MAKE FREQUENT PROFILE CHANGES. Everytime you change your profile even when its just 'text' descriptions the site makes you much more prominent and again stick you out like a sore-thumb with a sign that says "stalk me" when potential attackers utilize the online search function in conjunction with the 'sort by last modified' filter. Also be aware that your profile will most likely be cached by google and many other search engines.. So even when you delete information and remove photos stalkers can still look up the cached version and see what your profile was like before you made the latest changes.. This is why you should PUT AS LITTLE INFO on your profile as possible, and REFRAIN from making profile changes.. Always remember what you put out on the internet often times can NEVER be taken back! SO if you don't want it to stick forever don't even post it out!

    3. DELETE ALL YOUR INBOX, DRAFT, SENT AS SOON AS POSSIBLE and never archive information on here! If you want to maintain a "low" profile remember always to purge your private messages (both inbox AND sent) as frequently as you possibly can..

    4. Do NOT view people while logged in to your account. Don't ever let ANYONE see that you have viewed them! Even when you think that person is "safe" stalkers can stalk that person and see his/her "who has viewed me" page and leech on to YOU from there! Have multiple browsers such as FireFox, SRWARE IRON (DO NOT USE GOOGLE CHROME, this is worst Privacy browser EVER, Google chrome is basically a socially accepted backdoor rootkit trojan straight to Google -> NSA) and on the Firefox browser install adblocking extensions and privacy lists, this is because some people inject tracking tools in their profile that can capture your IP address even when you view their profile while "logged out".. Better yet remember to browse with TOR and this will become less of a problem anyway.. The reason for multiple browsers is so that you can "view" profiles with the Firefox browser while logged out and then write to others straight from the COMPOSE page in another browser such as SRWARE IRON (without first having to click on their page and then the "send message" -- which gives you away to OTHER people that views that persons profile..)

    The latest version of SRWARE IRON (based on chromium source) supports extensions so go get the adblock extension for that browser as well..



    5. Log out as soon as you log in.. You want to limit your "green light on time" to as little seconds as possible.. The best way to do this is to simultaneously login from one browser and then logout from the next.. Say you are going to login from Firefox and use it on firefox.. Well in that case login from both firefox and SRWARE Iron (or another trusted browser) and then logout from the second one.. You will remain logged in on the first browser but your "green light" status indicator will be dimmed.. This takes you completely off the "online" page so others who are browsing that page or who search for people who are currently "online" will not be able to find you.

    Better yet don't even remain logged in that long no matter what.. Disable your WALL and IM, CHAT and FORCE everyone to contact you via PM only.. Therefore whenever someone sends you a message you will get a CC to your real email address. (interpals private messages enable bbcode and someone can potentially stick a tracking script in your message to get your ip address and browser/os information) You can read that message more securely in your own email address and type up a response on your computer and when you are done with all the responses for the day then login, copy-and-paste to reply and finish for the day in less than 5 minutes and then promptly logoff.. Minimize your exposure to the site and keep your actual-logged in time to as few minutes per day as possible!

    6. Do not add anyone as a friend.. Even when you hide your friend list some stalkers can find you from your friend's friend list if their lists is not hidden as well. Also moderators can see everything on this site regardless of privacy settings so keep that in mind.. there is no such thing as "privacy settings" on any social networking site..

    7. Do not add anyone to your bookmarks, remove yourself from the interpals "search engine", and since you don't have any "friends" therefore on the "privacy" page make sure everything is set to "interpals members" or to "no one".. never select "everyone" for ANY reason..

    8. see #5 above.. Have a set time that you log in everyday and stick to it with discipline and do not ever deviate, and then logout immediately after you are done.. This is to prevent others from tracking your 'schedule' or 'routine'.. Also NEVER CLICK ON ANY MESSAGES.. read the cc'd version in your own personal email inbox instead! Delete all incoming private messages ASAP without ever clicking on them or reading them. Never give away the fact that you "read" a message, some stalkers constantly check their sent box to see WHEN you have read it.. (i'm talking about the whole pink simplification 'read notification' thing on private messages on interpals) This info can also be used to get an idea of your 'availability'.. You do not want to reveal that information..

    9. Be a good 'citizen' don't cause trouble, don't do anything stupid that could potentially get you reported, and follow also the steps I listed two posts above this one and also the general guidelines from the Original Poster and you will have effectively remained invisible on interpals..

    Leave a comment:


  • Guest's Avatar
    Guest replied
    hmm good advice but eoe can be traced by their use of electronics to every electronic advice has some special field sig or emits some kind of special rays a genius hacker can easily trace you so its no biggie i would rather enjoy it since you get money for free and it will shren you but thts just me so carry on

    Leave a comment:


  • Guest's Avatar
    Guest replied
    Re: How to identify a CyberStalker:

    In addition to all the nice little suggestions that have already been made I would like to contribute to the following:


    If you really want to remain as anonymous as possible and don't want to get stalked or even identified online you should also do the following:

    First off, use TOR (google it, or better yet use TOR + Scroogle.. you don't really want Google to know what you are searching for do you?? ).. Surfing on the internet without something like TOR is like making love without protection..

    I recommend get the Tor Browser Bundle if you are on Windoze.. Personally I would also add the firefox plugins called "noscript" and the adblock plugin with 'privacy' and 'easylist' lists added to block other tracking scripts and etc.. remember even with TOR your timezone on your machine still can be showing up on the sites you visit so switch also to a "random" timezone.. don't always use any timezone OTHER than your own timezone others that would generate suspicion and make you vulnerable to statistical analysis, therefore I recommend using a random number generator such as random.org to pick your random timezone EACH time you are in a TOR session.

    Also remember on Windows XP/Vista/7/etc your browsing tracks leave lots lots messy digital trails everywhere.. Therefore I recommend also to use TrueCrypt to encrypt your entire harddrive where Windoze is installed (pre-boot authentication) plus make a second hidden volume as "plausible denialability" incase the stalker/attacker comes to your house and forces you to put in a boot password, then all you have to do is type in the "decoy" password at bios bootup to boot to a "fake" os and system..

    If you are using linux bootable live cd or some live distro that is better yet since no harddrive required as it will be all in RAM.. you will not need harddisk encrpytion but remember to physicall secure your ram after you are done and the machine is powered down all the way.

    So once your computer is shutdown and turned off even NSA cannot crack the contents of your harddrive.. (though they can torture you to give it up to them..) However also be aware of something called TEMPEST and Van Eck Monitoring. (google it) Therefore you should build a homemade cage to contain the computer's EMI emissions especially if you have a old CRT monitor.. Use special shielding to prevent leaks from your VGA/DVI cables and etc.. There also have been password attacks that have been known to analyze the sound of your keyboard and your keystroke patterns, therefore best not to use physical keyboard (use software keyboard instead) and make sure your mouse can be trusted (and not a bugged mouse..) Since you are not using a keyboard you don't have to worry about hardware keyloggers but still make sure your system is clean (that you can trust your software and hardware..)

    When you shutdown your computer the memory ram sticks actually can store data for 5 minutes to as long as half an hour and that can be recovered if attacker gains physical access to your computer.. Therefore make sure you secure your computer for an hour after the shutdown.. This kind of attack is not common but can be known to happen so be careful, there is no use to have good harddrive encryption when the data is displayed in decrypted format in RAM, so physical security is very important! remember as in anything, the weakest link gives you away!


    Finally you need email address to signup on this site.. Well use email such as offered by lavabit.com .. this services offers asymmetrically encrypted email so therefore even the server admins cannot read your email.. Make sure you use secure password (random alphanumeric at least 21 characters length or longer) otherwise your email contents can still easily be brute force cracked, and also make sure SSL is on at all times and you see the "https" in your browser address bar..

    When signin up to the lavabit email service always use random number generator such as at random.org to generator a LONG (20+ char length) truly random alphanumeric string as the username for your lavabit email address.. (basically nothing that can get "googled" or associated with anything or anyone.. do not try to come up with a creative username or password or whatnot, just generator random ones each time) , also make sure you are still using TOR because lavabit DOES capture your ip address and places that in your email headers! Also remember to change/spoof your MAC address often.

    Also NSA has narus splitter in AT&T (and probably every major ISP) secret rooms that make digital carbon copy of every bit of information on the internets, so even random.org random generator strings/numbers/values are not TRULY random.. therefore to TRULY further strengthen the entropy/randomness of these random values print them out ( a list, array,matrix of these random values in rows and columns) and physically circle some random values (kinda like playing the lottery) and then using these that you circled then you make your own random number... after you are done with generating a truly nontracked random number then remember to shred and burn that piece of paper quick! ALso make sure there are no secret spy cameras in your room that could record your actions and see the random number on paper.. some printers have ram that keep a copy of what you last printed, so make sure your printer is physically secure as well, best to power down printer after done,..

    As for the password also use random number generator to generate random password.. using same or similiar method..

    make your interpals username random as well .. such as mine for example.. as for your interpals password use random secure password at least 16 characters in length.. DO NOT EVER USE THE SAME username or password for any two accounts.. NO getting lazy, no reusing, no repeating.. generate random username/password each and every time for everything you have to sign up for!

    do not put any identifiable information on your profile or during registration! when conversing with other people on here do not forget to watch what information you may accidentally leak out! all the best security and encryption in the world does no good when the human is the weakest link!

    preferably once you get to know someone do not further communicate with them on interpals using the private messaging system.. moderators and hackers and governments and easily see your messages on here.. would you trust the government? would you trust hackers? would you trust moderators? I hope not.. best is to encrypt your emails using truecrypt, then send it to your penpal via secure email such as lavabit, and have him/her decrypt on the other side with same password.. make different password for each different penpal.. this kind of sneakerware email encryption is safest (since it encrpyts the contents at ALL points and not just a few..) but make sure you read and write the email on a dedicated computer that is NEVER connected to any internets or networks..


    Never trust anyone or anything on this site.. anyone can pretend to be anyone on a site like this.. so setting the right gender, location, age limits will do you absolutely ZERO good.. you need to follow also these steps to take extra security precautions.. Despite what most people think not all fakes are easy to catch.. there are some VERY elaborate fakers on here that you will probably NEVER be able to catch.. for all you know you could be talking to an undercover cop or some serial rapists or terrorists on here! Never give out any real information or facts or stories or experiences that can be used to reconstruct who you are and to find your identity or type classify you or hunt you down in the real world or whatnot..

    Follows these steps and hopefully you will get reasonably safe from any stalker or pervert or serial killer or child rapist on this site.. unless he/she/it is the US government or superbadass elite hacker or ~spy~ then he/she/they/it will have nearly impossible time tracking or hunting you down... if you follow all these steps you can feel reaosonably safe and know that have peace of mind that for all intends and purposes you are basically nearly 100% anonymous on interpals.

    Leave a comment:

Working...
X